Monitoring Splunk

Windows 2008 event filtering

rriley
New Member

Trying to throw away events not wanted from a server - not working.

props.conf
[WinEventLog:Security]
TRANSFORMS-null = setnull

transform.conf
[setnull]
REGEX = (?m)^EventCode=(4658|4662|4689|4768|4769|4770|4771|4776|4931|4932|4933|4985|5136|5156)\D
DEST_KEY = queue
FORMAT = nullQueue

also tried:
REGEX = (?m)^EventCode=(4658|4662|4689|4768|4769|4770|4771|4776|4931|4932|4933|4985|5136|5156)\b

Any ideas?

Maybe this will be better than a support ticket - that takes forever to get an answer.

Tags (1)
0 Karma

yannK
Splunk Employee
Splunk Employee

Where are those props/transforms applied ?

They have to be where the events are parsed : on the indexer or on heavy forwarders, not on the Universal or Light Forwarders.

0 Karma

rriley
New Member

Sorry this is the config of a full splunk install set to forward. Not a light forwarder.

0 Karma

rriley
New Member

for some reason the (Backslash)\ was omitted when I pasted:

REGEX = (?m)^EventCode=(4658|4662|4689|4768|4769|4770|4771|4776|4931|4932|4933|4985|5136|5156)(backslash)\D

and
REGEX = (?m)^EventCode=(4658|4662|4689|4768|4769|4770|4771|4776|4931|4932|4933|4985|5136|5156)(backslash)\b

0 Karma

Starlette
Contributor

did you try this without the (backslash)D ?

0 Karma
Get Updates on the Splunk Community!

The OpenTelemetry Certified Associate (OTCA) Exam

What’s this OTCA exam? The Linux Foundation offers the OpenTelemetry Certified Associate (OTCA) credential to ...

From Manual to Agentic: Level Up Your SOC at Cisco Live

Welcome to the Era of the Agentic SOC   Are you tired of being a manual alert responder? The security ...

Splunk Classroom Chronicles: Training Tales and Testimonials (Episode 4)

Welcome back to Splunk Classroom Chronicles, our ongoing series where we shine a light on what really happens ...